Reason Why L2 Per Frame Authentication Is Required

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved.IP6FD v2.0—2-1 IPv6 Operations Defining and Configuring Neighbor Discovery.
Advertisements

Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
Doc.: IEEE /0032r0 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Internet Networking Spring 2003
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
Doc.: IEEE /0961r0 Submission July 2012 Alex Ashley, NDS LtdSlide 1 Layer 2 Service Discovery Protocols Date: Authors:
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Submission doc.: IEEE 11-10/0701r0 May 2012 Hitoshi Morioka, Allied Telesis R&D CenterSlide 1 Supplemental Information for HLCF Date: Authors:
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Doc.: IEEE /0977r2 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Doc.: IEEE /0977r4 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA Allied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Fast Initial Authentication
Higher Layer Packet Container Proposal Presentation
IT443 – Network Security Administration Instructor: Bo Sheng
Security&Privacy Considerations for IP over p OCB
Security in the layers 8: Network Security.
Zueyong Zhu† and J. William Atwood‡
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Broadcasting on WLAN Date: Authors: July 2017
Broadcasting on WLAN Date: Authors: September 2017
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
Broadcasting on WLAN Date: Authors: July 2017
doc.: IEEE /xxx Jon Edney, Nokia
Internet Networking Spring 2002
Relay Threat Model for TGaz
Broadcast Service on WLAN
doc.: IEEE /xxxr0 Mike Moreton
Triggering the Broadcast Probe Response
Broadcast Service on WLAN
AP Discovery Information Broadcasting
More Example Ideas around FIA
More Example Ideas around FIA
Fast Authentication in TGai
Relay Threat Model for TGaz
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Triggering the Broadcast Probe Response
Wireless LAN Security 4.3 Wireless LAN Security.
ESS Mesh Deployment Usage Model
IP Address assignment: Offline discussion summary
September 2011 April 2009 doc.: IEEE /xxxxr0
IP : Internet Protocol Surasak Sanguanpong
Using Upper Layer Message IE in TGai
Uplink Broadcast Service
Stefan Rommer, Mats Näslund, András Méhes (Ericsson)
802.11ak Architecture Date: Authors: July 2013
ESS Mesh Deployment Usage Model
Protocol ap1.0: Alice says “I am Alice”
Protocol ap1.0: Alice says “I am Alice”
Listen to Probe Request from other STAs
Performance Simulations
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Prioritized Active Scanning in TGai
Fast Authentication in TGai
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Motivation for Vendor Specific Request Element
Triggering the Broadcast Probe Response
[VTS –Failed FCS Behavior]
TGbc Closing Report Date: Authors: March 2019
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Potential L2 security options for UL BCS
Broadcast Service on WLAN
Chapter 8 roadmap 8.1 What is network security?
Comparison of Digital Signature with TESLA
Discussion on TESLA Based Frame Authentication
TESLA Based Frame Authentication
Use Cases of BCS Date: Authors: March 2018
Presentation transcript:

Reason Why L2 Per Frame Authentication Is Required Month Year doc.: IEEE 802.11-yy/xxxxr0 June 2018 Reason Why L2 Per Frame Authentication Is Required Date: 2018-06-18 Authors: Hitoshi Morioka, SRC Software John Doe, Some Company

Month Year doc.: IEEE 802.11-yy/xxxxr0 June 2018 Abstract This presentation describes the reason why L2 per frame authentication is required for BCS. Hitoshi Morioka, SRC Software John Doe, Some Company

System Structure Assumption June 2018 System Structure Assumption STA Internet Server AP STA STA IP Multicast IEEE802.11 Multicast Simplify Server Router AP STA STA selects information by ID of information (e.g. SSID) Hitoshi Morioka, SRC Software

Case 1: No Authentication June 2018 Case 1: No Authentication Server Router AP STA Spoofing MAC address and Information ID Rogue AP If no authentications are provided, a malicious user can make a fake AP easily by spoofing AP’s MAC address and Information ID. Rogue AP can do the following attacks. DoS attack by injecting invalid frames to the stream Distributing fake information Hitoshi Morioka, SRC Software

Case 2: Existing GTKSA Server Router AP STA Rogue AP June 2018 Case 2: Existing GTKSA Server Router AP STA Spoofing MAC address and Information ID Rogue AP The existing GTKSA provides per frame authentication and encryption to the multicast frames. The GTKSA uses symmetric algorithm. A malicious user who can join the GTKSA can make a fake AP. The existing GTKSA is not suitable for public use. Hitoshi Morioka, SRC Software

Case 3: Application Layer Per Packet Authentication (No Fragmentation) June 2018 Case 3: Application Layer Per Packet Authentication (No Fragmentation) Server Router AP STA Preinstalled CA Public Key Private Key Public Key Verify Sign by CA Sign Data Sign Data Sign Data Sign Data Sign Data Sign Data Sign Verify The server generates private/public key pair. The CA signs the server’s public key. The server distributes the public key to STAs with CA signature. The STAs verify the server’s public key by preinstalled CA’s public key. The server signs each packet by the private key. The STAs can verify each packet by the public key. If the packets are never fragmented by the router on the path, it will work well. Hitoshi Morioka, SRC Software

June 2018 Case 4: Application Layer Per Packet Authentication (With Fragmentation) Private Key Public Key Server Router AP STA Data Sign Data Data Data Data Invalid Data Sign Sign Invalid Data Malicious Sign Same as Case 3 except the router fragments packets. If an invalid frame is injected between fragmented packets, the STA will fail to verify and discard whole packet. Malicious user can cause DoS attack by injecting an invalid frame between fragmented packets. For unicast, the server can avoid fragmentation by performing path MTU discovery and use DF flag. For multicast, the server cannot perform path MTU discovery and the routers never returns ICMP “fragmentation required” message even if the packet size exceeds MTU. (IPv4) Hitoshi Morioka, SRC Software

Case 5: L2 Per Frame Authentication June 2018 Case 5: L2 Per Frame Authentication Private Key Public Key Server Router AP STA Data Data Data Data Invalid Data Sign Sign Malicious The AP generates private/public key pair. The AP distributes the public key to STAs. The AP signs each frame by the private key. The STA can verify each frame by the public key. The STA can detect invalid frames and discard them. Of course, it can be used with application layer authentication. Hitoshi Morioka, SRC Software